Senior SOC Analyst (L2 → L3) - Consultancy
Hybrid – 1 day per week in office.
£45,000-£50,000.
Must be eligible for SC clearance.
Are you an experienced SOC Analyst ready to step up into a more senior, L3-focused role? A specialist Cyber Consultancy is expanding its Security Operations capability and is looking for a driven Senior SOC Analyst to join the team.
As part of their growing cyber practice, you'll work with a wide range of clients, lead investigations, enhance detection capabilities, and play a key role in maturing our security posture.
Key Responsibilities
* Lead on security incidents, providing L3-level investigation and root‑cause analysis.
* Develop and optimise detection rules and analytics within Microsoft Sentinel.
* Write advanced KQL queries to support threat hunting and incident response.
* Apply MITRE ATT&CK framework principles to enhance detection logic and playbooks.
* Perform threat hunting, continuous monitoring, and advisory to L1/L2 analysts.
* Contribute to SOC process improvements and documentation.
Required Skills & Experience
* Strong L2 SOC experience and ready to move into an L3-level role.
* Hands‑on experience with Microsoft Sentinel and the broader Microsoft security stack (Defender, Azure security).
* Ability to write and troubleshoot KQL queries.
* Solid understanding of the MITRE ATT&CK framework and how it maps within Sentinel.
* Strong analytical skills and a proactive approach to investigations.
* Eligible for SC clearance (UK-based for the last 5 years).
Why Join?
* Opportunity to work across multiple environments, clients, and technologies.
* Clear progression into full L3 responsibilities.
* Supportive consultancy environment with access to training, development, and certifications.
* Hybrid working with only one day per week in the office.
How to Apply
If you're looking to take the next step in your SOC career and move into a senior role with real impact, love to hear from you. Apply now or message me directly for more details.
#J-18808-Ljbffr